833-847-3280
Schedule a Call

Year: 2020

What is the OWASP® Top 10
You may have seen the OWASP® Top 10 on our site or around the web and are wondering what it is. What is OWASP®? Let’s start with what OWASP® is.  It stands for the Open Web Application Security Project®. They are a nonprofit organization whose…
What is a Security Risk Assessment and why is it so Important?
What is a Security Risk Assessment? A Security Risk Assessment identifies and assesses key security controls in your security program, an application, or life.  Think of it this way, when operating your automobile and you decide to turn left with oncoming traffic flowing, you are…
Is That Wireless Network Safe?
Though there may not be much traveling these days, we all have gadgets and gizmos that require wireless signals. Connecting to a wireless network may be inevitable; however, how do you know that the public Wi-Fi you are using is actually secure? The Scenario It’s…
Cybersecurity Partners are Important, But Why?
It’s important to understand the basics of why having a cybersecurity partner assist in securing your corporation’s infrastructure should be at the top of your list for funding.  Most C-Suite personnel will not look at the security posture of their corporation’s network until a breach…
A Letter to the Cyber Security Unaware
What is Cyber Security? Let’s break Cyber Security down into its parts. What is Cyber? Cyber is a buzz word that relates to anything involving computers.  Computers can be anything these days.  Smartphones, laptops, tablets, ATM machines, even some watches are computers. What is Security?…
MainNerve LLC Announces Commitment to Global Efforts Supporting and Promoting Online Safety and Privacy for Cybersecurity Awareness Month
CyberSecurity Awareness Month September 17, 2020 — MainNerve LLC today announced its commitment to Cybersecurity Awareness Month. It is held annually in October. The Cybersecurity Awareness Month Champions Program is a collaborative effort. It includes businesses, government agencies, colleges and universities, associations, nonprofit organizations and…
What Are Rules of Engagement in Pen Testing?
If you think the Rules of Engagement sound like a war movie, you’re not alone.  In the penetration testing world, it’s more about cyber warfare, indirectly. What is it? Proactive penetration testing can help combat would-be attackers by identifying vulnerabilities before they do.  The Rules…
New Cybersecurity Guidelines for CTPAT Members
Earlier this year, Customs Trade Partnership Against Terrorism (CTPAT) released guidelines for minimum security criteria to be used by CTPAT members.  This includes physical security as well as cybersecurity. What is CTPAT CTPAT is open to members of the trade community who demonstrate that their…
Many Internet of Things Devices Have Significant Vulnerability
Last week, JSOF published 19 vulnerabilities found in Internet of Things devices. Ripple20 is the name for the collection of vulnerabilities. JSOF is a team of experienced cyber security professionals, with a wide and deep understanding of software, technology, and security.  They have deemed this…
Password Behavior: How to Secure Your Accounts Better
LastPass, a password management software company, recently conducted a survey on password behavior.  They surveyed 3,250 global respondents revealing poor password hygiene. Nearly half (44%) of the respondents stated that they reuse passwords or similar passwords on multiple sites.  While most (91%) stated they know…
contact

Our Team

Name(Required)
This field is for validation purposes and should be left unchanged.
On Load
Where? .serviceMM
What? Mega Menu: Services